Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Primary Threats to Computer Security
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Computer Fraud Chapter 5.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 8/30/ Accessories for “war driving” can.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/ Chapter 11 Information Systems Ethics.
Staying Safe Online Keep your Information Secure.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/ Accessories for “war driving” can.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
IT in Business Issues in Information Technology Lecture – 13.
Safety and Security issues of using ICT Alys brooks.
Cybercrime What is it, what does it cost, & how is it regulated?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Securing Information Systems
IT Security  .
Challenges We Face On the Internet
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing Information Systems
Entering the World of Cybercrime
Presentation transcript:

Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems

Copyright © 2014 Pearson Education, Inc. 2 Chapter 10 Learning Objectives Computer Crime Define computer crime and describe several types of computer crime. Cyberwar and Cyberterrorism Describe and explain the differences between cyberwar and cyberterrorism. Information Systems Security Explain what is meant by the term “IS security” and describe both technology and human based safeguards for information systems. Managing IS Security Discuss how to better manage IS security and explain the process of developing an IS security plan. Information Systems Controls, Auditing, and the Sarbanes-Oxley Act Describe how organizations can establish IS controls to better ensure IS security.

Copyright © 2014 Pearson Education, Inc. 3 Computer Crime Define computer crime and describe several types of computer crime. Cyberwar and Cyberterrorism Describe and explain the differences between cyberwar and cyberterrorism. Information Systems Security Explain what is meant by the term “IS security” and describe both technology and human based safeguards for information systems. Managing IS Security Discuss how to better manage IS security and explain the process of developing an IS security plan. Information Systems Controls, Auditing, and the Sarbanes-Oxley Act Describe how organizations can establish IS controls to better ensure IS security.

Copyright © 2014 Pearson Education, Inc. 4 What Is Computer Crime? “Using a computer to commit an illegal act” Targeting a computer while committing an offense – Unauthorized access of a server to destroy data Using a computer to commit an offense – Using a computer to embezzle funds Using computers to support a criminal activity – Maintaining books for illegal gambling on a computer

Copyright © 2014 Pearson Education, Inc. 5 Hacking and Cracking Hackers – Anyone with enough knowledge to gain unauthorized access to computers – Hackers who aren’t crackers don’t damage or steal information belonging to others Crackers – Individuals who break into computer systems with the intent to commit crime or do damage – Hacktivists: Crackers who are motivated by political or ideological goal and who use Cracking to promote their interests

Copyright © 2014 Pearson Education, Inc. 6 Types of Computer Crimes Unauthorized Access – Stealing information – Stealing use of computer resources – Accessing systems with the intent to commit Information Modification Information Modification – Changing data for financial gain (e.g.: embezzlement) – Defacing a Web site (e.g.: hactivists making a statement)

Copyright © 2014 Pearson Education, Inc. 7 Computer Viruses and Other Destructive Code: Spyware, Spam, and Cookies Spyware, Spam, and Cookies – Spyware: software that monitors the activity on a computer, such as the Web sites visible or even the keystrokes of the user – Spam: Bulk unsolicited sent to millions of users at extremely low cost, typically seeking to sell a product, distribute malware, or conduct a phishing attack – Cookies: A small file Web sites place on user’s computer. Can be legitimate (to capture items in a shopping cart) but can be abused (to track individuals browsing habits) and can contain sensitive information (like credit card numbers) and pose a security risk

Copyright © 2014 Pearson Education, Inc. 8 Cyberharassment, Cyberstalking, and Cyberbullying Cyberharassment – Use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress Cyberstalking – Tracking an individual, performing harassing acts not otherwise covered by Cyberharassment, or inciting others to perform harassing acts CyberBullying – Deliberately causing emotional distress All three are closely related, a Cyberstalker may be committing Cyberharassment and Cyberbullying

Copyright © 2014 Pearson Education, Inc. 9 Information Systems Security Computer Crime Define computer crime and describe several types of computer crime. Cyberwar and Cyberterrorism Describe and explain the differences between cyberwar and cyberterrorism. Information Systems Security Explain what is meant by the term “IS security” and describe both technology and human based safeguards for information systems. Managing IS Security Discuss how to better manage IS security and explain the process of developing an IS security plan. Information Systems Controls, Auditing, and the Sarbanes-Oxley Act Describe how organizations can establish IS controls to better ensure IS security.

Copyright © 2014 Pearson Education, Inc. 10 Safeguarding IS Resources Risk Reduction – Actively installing countermeasures Risk Acceptance – Accepting any losses that occur Risk Transference – Insurance – Outsourcing

Copyright © 2014 Pearson Education, Inc. 11 Technological Safeguards: Encryption

Copyright © 2014 Pearson Education, Inc. 12 Technological Safeguards: Virus monitoring and prevention Standard precautions – Purchase, install, and maintain antivirus software – Do not use flash drives or shareware from unknown or suspect sources – Use reputable sources when downloading material from the Internet – Delete without opening any message received from an unknown source – Do not blindly open attachments, even if they come from a known source – If your computer system contracts a virus, report it

Copyright © 2014 Pearson Education, Inc. 13 Technological Safeguards: Audit-control software All computer activity can be logged and recorded Audit-control software keeps track of computer activity Only protects security if results are monitored

Copyright © 2014 Pearson Education, Inc. 14 Technological Safeguards: Secure data centers - Ensuring Availability

Copyright © 2014 Pearson Education, Inc. 15 Technological Safeguards: Secure data centers Securing the facilities infrastructure – Backups – Backup Sites – Redundant Data Centers – Closed-Circuit Television – Uninterruptible Power Supply

Copyright © 2014 Pearson Education, Inc. 16 Human Safeguards

Copyright © 2014 Pearson Education, Inc. 17 Computer Forensics Formally evaluating digital information for judicial review – Examining the computers of crime victims for evidence – Examining the computers of criminals for evidence – Auditing computer activity logs – Restoring “deleted” computer data

Copyright © 2014 Pearson Education, Inc. 18 Information Systems Controls, Auditing, and the Sarbanes-Oxley Act Computer Crime Define computer crime and describe several types of computer crime. Cyberwar and Cyberterrorism Describe and explain the differences between cyberwar and cyberterrorism. Information Systems Security Explain what is meant by the term “IS security” and describe both technology and human based safeguards for information systems. Managing IS Security Discuss how to better manage IS security and explain the process of developing an IS security plan. Information Systems Controls, Auditing, and the Sarbanes-Oxley Act Describe how organizations can establish IS controls to better ensure IS security.

Copyright © 2014 Pearson Education, Inc. 19 Information System Controls: Hierarchy

Copyright © 2014 Pearson Education, Inc. 20 Information System Controls Preventive controls – Prevent events from occurring (e.g., block unauthorized access) Detective controls – Determine if anything has gone wrong (e.g., detect that an unauthorized access has occurred) Corrective controls – Mitigate problems after they arise

Copyright © 2014 Pearson Education, Inc. 21 END OF CHAPTER CONTENT

Copyright © 2014 Pearson Education, Inc. 22